Æȷοì
J. Haadi Jafarian
J. Haadi Jafarian
Assistant Professor at Department of Computer Science and Engineering, University of Colorado Denver
ucdenver.eduÀÇ À̸ÞÀÏ È®ÀÎµÊ - ȨÆäÀÌÁö
Á¦¸ñ
Àοë
Àοë
¿¬µµ
Openflow random host mutation: transparent moving target defense using software defined networking
JH Jafarian, E Al-Shaer, Q Duan
Proceedings of the first workshop on Hot topics in software defined networks ¡¦, 2012
7272012
Random host mutation for moving target defense
E Al-Shaer, Q Duan, JH Jafarian
International Conference on Security and Privacy in Communication Systems ¡¦, 2012
2032012
An Effective Address Mutation Approach for Disrupting Reconnaissance Attacks
JH Jafarian, E Al-Shaer, Q Duan
IEEE Transactions on Information Forensics and Security 10 (12), 2562 - 2577, 2015
1642015
Efficient random route mutation considering flow and network constraints
Q Duan, E Al-Shaer, H Jafarian
2013 IEEE Conference on Communications and Network Security (CNS), 260-268, 2013
1482013
Spatio-temporal address mutation for proactive cyber agility against sophisticated attackers
JHH Jafarian, E Al-Shaer, Q Duan
Proceedings of the First ACM Workshop on Moving Target Defense, 69-78, 2014
1232014
Adversary-aware IP address randomization for proactive agility against sophisticated attackers
JH Jafarian, E Al-Shaer, Q Duan
2015 IEEE conference on computer communications (INFOCOM), 738-746, 2015
872015
Formal approach for route agility against persistent attackers
JH Jafarian, E Al-Shaer, Q Duan
Computer Security–ESORICS 2013: 18th European Symposium on Research in ¡¦, 2013
602013
Multi-dimensional host identity anonymization for defeating skilled attackers
JH Jafarian, A Niakanlahiji, E Al-Shaer, Q Duan
Proceedings of the 2016 ACM Workshop on Moving Target Defense, 47-58, 2016
392016
Conceal: A strategy composition for resilient cyber deception-framework, metrics and deployment
Q Duan, E Al-Shaer, M Islam, H Jafarian
2018 IEEE Conference on Communications and Network Security (CNS), 1-9, 2018
332018
Webmtd: defeating web code injection attacks using web element attribute mutation
A Niakanlahiji, JH Jafarian
Proceedings of the 2017 Workshop on Moving Target Defense, 17-26, 2017
202017
Towards a general framework for optimal role mining: A constraint satisfaction approach
JH Jafarian, H Takabi, H Touati, E Hesamifard, M Shehab
Proceedings of the 20th ACM Symposium on Access Control Models and ¡¦, 2015
182015
CAMAC: A Context-Aware Mandatory Access Control Model.
JH Jafarian, M Amini
ISeCure 1 (1), 2009
172009
A game-theoretically optimal defense paradigm against traffic analysis attacks using multipath routing and deception
M Abolfathi, I Shomorony, A Vahid, JH Jafarian
Proceedings of the 27th ACM on symposium on access control models and ¡¦, 2022
142022
A vagueness-based obfuscation technique for protecting location privacy
JH Jafarian
2010 IEEE Second International Conference on Social Computing, 865-872, 2010
132010
GTHBAC: a generalized temporal history based access control model
AN Ravari, JH Jafarian, M Amini, R Jalili
Telecommunication Systems 45, 111-125, 2010
122010
Webmtd: Defeating cross-site scripting attacks using moving target defense
A Niakanlahiji, JH Jafarian
Security and Communication Networks 2019, 2019
112019
Protecting location privacy through a graph-based location representation and a robust obfuscation technique
JH Jafarian, AN Ravari, M Amini, R Jalili
Information Security and Cryptology–ICISC 2008: 11th International ¡¦, 2009
102009
Deliverying Honeypots as a Service
JH Jafarian, A Niakanlahiji
53rd Hawaii International Conference on System Sciences (HICSS 53), 2020
92020
Insider threat mitigation using moving target defense and deception
H Takabi, JH Jafarian
Proceedings of the 2017 international workshop on managing insider security ¡¦, 2017
92017
HoneyBug: Personalized cyber deception for web applications
A Niakanlahiji, JH Jafarian, BT Chu, E Al-Shaer
82020
ÇöÀç ½Ã½ºÅÛÀÌ ÀÛµ¿µÇÁö ¾Ê½À´Ï´Ù. ³ªÁß¿¡ ´Ù½Ã ½ÃµµÇØ ÁÖ¼¼¿ä.
ÇмúÀÚ·á 1–20